RE: AD Review of draft-ietf-rtgwg-mrt-frr-algorithm-07

Chris Bowers <cbowers@juniper.net> Sun, 10 January 2016 18:02 UTC

Return-Path: <cbowers@juniper.net>
X-Original-To: rtgwg@ietfa.amsl.com
Delivered-To: rtgwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3066F1ACE68; Sun, 10 Jan 2016 10:02:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.799
X-Spam-Level:
X-Spam-Status: No, score=0.799 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fR5fb2f2pqOv; Sun, 10 Jan 2016 10:01:51 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0103.outbound.protection.outlook.com [65.55.169.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 433BA1A88D4; Sun, 10 Jan 2016 10:01:51 -0800 (PST)
Received: from BY2PR05MB614.namprd05.prod.outlook.com (10.141.218.148) by BY2PR05MB613.namprd05.prod.outlook.com (10.141.218.145) with Microsoft SMTP Server (TLS) id 15.1.361.13; Sun, 10 Jan 2016 18:01:45 +0000
Received: from BY2PR05MB614.namprd05.prod.outlook.com ([10.141.218.148]) by BY2PR05MB614.namprd05.prod.outlook.com ([10.141.218.148]) with mapi id 15.01.0361.006; Sun, 10 Jan 2016 18:01:45 +0000
From: Chris Bowers <cbowers@juniper.net>
To: "Alvaro Retana (aretana)" <aretana@cisco.com>, "draft-ietf-rtgwg-mrt-frr-algorithm@ietf.org" <draft-ietf-rtgwg-mrt-frr-algorithm@ietf.org>
Subject: RE: AD Review of draft-ietf-rtgwg-mrt-frr-algorithm-07
Thread-Topic: AD Review of draft-ietf-rtgwg-mrt-frr-algorithm-07
Thread-Index: AQHRRV7dgEWOmft+i0q5eg7hbSc74p7rnG7Q
Date: Sun, 10 Jan 2016 18:01:45 +0000
Message-ID: <BY2PR05MB614E1B79923021EB4BCE996A9C80@BY2PR05MB614.namprd05.prod.outlook.com>
References: <D2A7EEA5.F51B2%aretana@cisco.com>
In-Reply-To: <D2A7EEA5.F51B2%aretana@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cbowers@juniper.net;
x-originating-ip: [66.129.239.15]
x-microsoft-exchange-diagnostics: 1; BY2PR05MB613; 5:i0np9UH4vx3FqhhNbtEHLGxjFCoamFA4//tm71C1J5IDnffbs8A10+4EtGNn6FrmoiRpVV0uhyGOgb9hG1ztoX53UzAqLHoNcYmywMCjaUqm6cjSeNR6Y0zIsoYOY7NDXMwO+woCvLog7QRIXb1rwQ==; 24:sv2RFOPf6okS8CFMCn2bbVfjGoVene2/dFBrLsgSyuTVksYSNSIu63aKmuz4TNHg7mpb5RLfdY4LsB8pKKPmAIKwig3PsFV3ekuOXy+iK+w=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR05MB613;
x-ms-office365-filtering-correlation-id: 23839f48-6fbb-4978-3866-08d319e81a89
x-microsoft-antispam-prvs: <BY2PR05MB613051DCCD0455FF049A0AAA9C80@BY2PR05MB613.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(95692535739014);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(8121501046)(5005006)(3002001)(10201501046); SRVR:BY2PR05MB613; BCL:0; PCL:0; RULEID:; SRVR:BY2PR05MB613;
x-forefront-prvs: 0817737FD1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(51444003)(164054003)(189002)(199003)(377454003)(6116002)(19580405001)(87936001)(19580395003)(50986999)(76176999)(66066001)(33656002)(19300405004)(54356999)(19625215002)(86362001)(11100500001)(586003)(5003600100002)(10400500002)(15975445007)(40100003)(5004730100002)(77096005)(2900100001)(2501003)(4326007)(92566002)(575784001)(2906002)(2950100001)(5008740100001)(1096002)(106116001)(101416001)(230783001)(97736004)(122556002)(99286002)(102836003)(5001770100001)(106356001)(1220700001)(790700001)(5002640100001)(3846002)(81156007)(19617315012)(5001960100002)(189998001)(16236675004)(74316001)(76576001)(105586002)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR05MB613; H:BY2PR05MB614.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BY2PR05MB614E1B79923021EB4BCE996A9C80BY2PR05MB614namprd_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jan 2016 18:01:45.5648 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR05MB613
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtgwg/UFqHdcR2_1fzjTRt18tiJ5-ujeU>
Cc: "rtgwg-chairs@ietf.org" <rtgwg-chairs@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
X-BeenThere: rtgwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Routing Area Working Group <rtgwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtgwg/>
List-Post: <mailto:rtgwg@ietf.org>
List-Help: <mailto:rtgwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtgwg>, <mailto:rtgwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Jan 2016 18:02:00 -0000

Alvaro,

Thanks for your detailed feedback.  I've posted  a new revision incorporating your comments.

The new revision is here.
https://www.ietf.org/internet-drafts/draft-ietf-rtgwg-mrt-frr-algorithm-08.txt

The diff is here.
https://www.ietf.org/rfcdiff?url2=draft-ietf-rtgwg-mrt-frr-algorithm-08

See specific responses and text inline with [CB].

I also included links to diffs on github containing the XML edits addressing particular issues or set of issues.  They are intended to help in reviewing the edits, but refer to the version submitted for the latest definitive revision.

Thanks,
Chris

From: Alvaro Retana (aretana) [mailto:aretana@cisco.com]
Sent: Saturday, January 02, 2016 7:10 AM
To: draft-ietf-rtgwg-mrt-frr-algorithm@ietf.org
Cc: rtgwg@ietf.org; rtgwg-chairs@ietf.org; Janos Farkas <janos.farkas@ericsson.com>
Subject: AD Review of draft-ietf-rtgwg-mrt-frr-algorithm-07

Hi!

I just finished reviewing this document.  I have several comments (below) that I want to see addressed before starting the IETF Last Call.

As with draft-ietf-rtgwg-mrt-frr-architecture, my main point of concern is related to operational/management considerations - the Architecture document should carry the load of these considerations, but there are some that I think are algorithm-specific and should be included here.

Thanks!

Alvaro.

Major:

  1.  Operational/Management Considerations
     *   Section 1. (Introduction): "This document defines an algorithm for selecting an appropriate MRT alternate for consideration.  Other alternates, e.g.  LFAs that are downstream paths, may be preferred when available and that policy-based alternate selection process [I-D.ietf-rtgwg-lfa-manageability] is not captured in this document."  This paragraph seems to say that the criteria in I-D.ietf-rtgwg-lfa-manageability applies also to the selection between MRT alternates and others.  Is that the intent?
        *   Later in Section 5.4. (Initialization) you mention the criteria in I-D.ietf-rtgwg-lfa-manageability applied to MRT ("Due to FRR manageability considerations [I-D.ietf-rtgwg-lfa-manageability], it may also be desirable to administratively configure some interfaces as ineligible to carry MRT FRR traffic.").
        *   I mention all this because I-D.ietf-rtgwg-lfa-manageability is listed as an Informative Reference both in this document and in draft-ietf-rtgwg-mrt-frr-architecture (where there's just a light mention of manageability).  If the criteria/recommendations in I-D.ietf-rtgwg-lfa-manageability are to be followed, then I would like to see a stronger statement about it.  [There is a corresponding comment included in my review of draft-ietf-rtgwg-mrt-frr-architecture.]
     *   I'm surprised that there are no Operational Considerations in this document.  I am hoping to see general considerations in draft-ietf-rtgwg-mrt-frr-architecture, but some of the specifics are clearly algorithm related - the resulting length of the alternate path, for example.  Please include an Operational Considerations section where some of the guidance given in the document can be reflected, for example:
        *   Section 5.3. (GADAG Root Selection)  "Analysis has shown that the centrality of a router can have a significant impact on the lengths of the alternate paths computed.  Therefore, it is RECOMMENDED that off-line analysis that considers the centrality of a router be used to help determine how good a choice a particular router is for the role of GADAG root."
        *   Section 9. (Algorithm Alternatives and Evaluation)  "In addition, it is possible to calculate Destination-Rooted GADAG...Building GADAGs per destination is computationally more expensive, but may give somewhat shorter alternate paths.  It may be useful for live-live multicast along MRTs."
        *   [[Minor] BTW, it looks like multicast is outside the scope of draft-ietf-rtgwg-mrt-frr-architecture.  That doesn't mean that the algorithm may not be useful for it - but Section 9 is the only place that multicast is mentioned.]
==========================
[CB]  I created the operational considerations section (copied below).   Some material could go in either this or the Operational Considerations section of the architecture draft, so we could still shift items to or from that section.   I also removed the references to  [I-D.ietf-rtgwg-lfa-manageability] and made edits to have the text stand on its own.  The diff of changes addressing the above issues is:
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/9a18f300dfddcc0829c980393f0e39eeb19b3813
10.  Operational Considerations

   This sections discusses operational considerations related to the the
   MRT Lowpoint algorithm and other potential MRT algorithm variants.
   For a discussion of operational considerations related to MRT-FRR in
   general, see the Operational Considerations section of
   [I-D.ietf-rtgwg-mrt-frr-architecture].

10.1.  GADAG Root Selection

   The Default MRT Profile uses the GADAG Root Selection Priority
   advertised by routers as the primary criterion for selecting the
   GADAG root.  It is RECOMMENDED that an operator designate a set of
   routers as good choices for selection as GADAG root by setting the
   GADAG Root Selection Priority for that set of routers to lower (more
   preferred) numerical values.  Criteria for making this designation
   are discussed below.

   Analysis has shown that the centrality of a router can have a
   significant impact on the lengths of the alternate paths computed.
   Therefore, it is RECOMMENDED that off-line analysis that considers
   the centrality of a router be used to help determine how good a
   choice a particular router is for the role of GADAG root.

   If the router currently selected as GADAG root becomes unreachable in
   the IGP topology, then a new GADAG root will be selected.  Changing
   the GADAG root can change the overall structure of the GADAG as well
   the paths of the red and blue MRT trees built using that GADAG.  In
   order to minimize change in the associated red and blue MRT
   forwarding entries that can result from changing the GADAG root, it
   is RECOMMENDED that operators prioritize for selection as GADAG root
   those routers that are expected to consistently remain part of the
   IGP topology.

10.2.  Destination-rooted GADAGs

   The MRT Lowpoint algorithm constructs a single GADAG rooted at a
   single node selected as the GADAG root.  It is also possible to
   construct a different GADAG for each destination, with the GADAG
   rooted at the destination.  A router can compute the MRT-Red and MRT-
   Blue next-hops for that destination based on the GADAG rooted at that
   destination.  Building a different GADAG for each destination is
   computationally more expensive, but it may give somewhat shorter
   alternate paths.  Using destination-rooted GADAGs would require a new
   MRT profile to be created with a new MRT algorithm specification,
   since all routers in the MRT Island would need to use destination-
   rooted GADAGs.

===========================

  1.  Section 3. (Terminology and Definitions)  Not all the common terms between this document and draft-ietf-rtgwg-mrt-frr-architecture are defined the same way.  Some differences are indeed small, but to avoid confusion and misinterpretation please be consistent.  Suggestion: include in this document only the terms that were not present in draft-ietf-rtgwg-mrt-frr-architecture.
=============
[CB] Agreed.  Changes in this diff.
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/d70e29a9d775f759b7ba21f4fcc8a9ddc3c55fc9
=============

  1.  References to Extensions.  This document describes an algorithm to be used in the MRT Architecture..as such, please leave mention of the extensions/specific solutions out - as those other drafts progress the picture will be complete.  Some pointers:
     *   All references to I-D.ietf-ospf-mrt and I-D.ietf-isis-mrt.
     *   Section 5.4. (Initialization): "This constraint MUST be consistently flooded via the IGP [I-D.ietf-ospf-mrt] [I-D.ietf-isis-mrt]...so that links are known to be MRT-ineligible..."   I'm venturing to say that the requirement here is for all the routers in the area/level/island to have this information, while the specific mechanism (IGP flooding, magic central box, manual configuration, etc.) is an implementation detail.  I fully understand that IGP flooding may be the best/obvious choice and that implementations are being worked in that direction, but I think that's the job of the extension drafts (to indicate how to meet the requirement with IGP flooding, or the magic box, or etc..).
=============
[CB]  Removal of references is done in this diff:
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/87f2ca3e340d372dd46898a9f39de2a6bd7197c4
=============

  1.  Section 9.1. (Algorithm Evaluation)  I am disappointed that you chose not to focus this section on MRT Algorithm Alternatives and Evaluation, and instead decided to compare MRT with solutions that don't provide complete coverage - and kicked off the discussion precisely with the coverage (Figure 30).  Please remove the comparison to other technologies that are not potential MRT algorithms.
     *   Later in the text you do get back to data specific to the Lowpoint Algorithm and the ones described in the Appendixes.
=============
[CB]  Done is this diff.
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/561365b49d04c65f9b98313de88ded0520f71340
==============
Minor:

  1.  Other algorithms.  In several places general statements about algorithms for MRT are made - I'm assuming that you are referring to the algorithms mentioned/considered in this document (and not making statements about other yet-to-be-known algorithms), is that correct?  If so, please be clear about it.  Here are some examples:
     *   1. (Introduction): "Algorithms for computing MRTs can handle arbitrary network topologies..."
     *   4. (Algorithm Key Concepts): "There are five key concepts that are critical for understanding...other algorithms for computing MRTs."
     *   9. (Algorithm Alternatives and Evaluation) "This specification defines the MRT Lowpoint Algorithm, which is one option among several possible MRT algorithms.  Other alternatives are described in the appendices."
============================
[CB]  Done in diff below.  Also changed title to "An Algorithm" as opposed to "Algorithms" to focus on MRT Lowpoint algorithm.  I also changes several references to "algorithm" to "GADAG construction method" to avoid ambiguity.
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/54c28c2206d7aa8844dd01fce9940fc15b323220
============================

  1.  Section 5. (Algorithm Sections)  s/This algorithm/The MRT Lowpoint algorithm
  2.  Section 5.1. (Interface Ordering)
     *   Why are the values in Figure 15 for ISIS-PCR not considered Normative?
        *   I'm a little bit confused because the Interface_Compare function depends on the values; what happens if the values received are not the expected ones?  For ISIS-PRC, can I use some other source for those values?
        *   [I took a quick peek at draft-ietf-isis-pcr, but didn't find a mention of MRT Node ID, for example.]
     *   The last paragraph in this Section seems superfluous to me as it doesn't add/change anything.
============================
[CB] I changed the reference to 802.1Qca, where the normative reference is found in clause 45.3.3., and pointed out that the normative reference is there.  The goal is to have the normative reference only defined in one place.
Done in this diff.
https://github.com/cbowers/draft-ietf-rtgwg-mrt-frr-algorithm/commit/ef39e599f305713825aa9f65e4445478eec40a80




   The Interface_Compare function in Figure 14 relies on the

   interface.metric and the interface.neighbor.mrt_node_id values to

   order interfaces.  The exact source of these values for different

   IGPs and applications is specified in Figure 15.  The metric and

   mrt_node_id values for OSPFv2, OSPFv3, and IS-IS provided here is

   normative.  The metric and mrt_node_id values for ISIS-PCR in this

   table should be considered informational.  The normative values are

   specified in [IEEE8021Qca] .


============================

Nits:

  1.  I would put the Python code in an Appendix.
[CB] Done.